Cisco Introduction to Cybersecurity Course with Certification

Cisco Introduction to Cybersecurity Course Certification

Organizer: Cisco, Networking Academy.

Explore the exciting field of cybersecurity and why cybersecurity is a future-proof career. Cisco Introduction to Cybersecurity Course Online with Certification & Budge.

About the Course

  • Skills You Will Learn: Network Vulnerabilities, Cybersecurity, Threat Detection, Privacy And Data Confidentiality, Cyber Best Practices.
  • Course Fee: Free
  • Duration: 6 Hours
  • Level: Beginner
  • Lab: 7 Labs
  • Delivery Type: Self-paced
  • The exam consists of 15 questions and 70% is required to pass.
  • You have unlimited attempts to pass the exam.
  • You have no time limit per attempt to pass the exam.

Here’s what you will learn.

  • My Knowledge Check
  • Course Navigation Tutorial
  • Module 1: Introduction to Cybersecurity
  • Module 2: Attacks, Concepts and Techniques
  • Module 3: Protecting your Data and Privacy
  • Module 4: Protecting the Organization
  • Module 5: Will Your Future Be in Cybersecurity?
  • Introduction to Cybersecurity: Course Final Exam

Apply Link

This introductory course takes you inside the world of cybersecurity. You will learn cybersecurity basics to protect your personal digital life and gain insights into the biggest security challenges companies, governments, and educational institutions face today. Cybersecurity professionals who can protect and defend an organization’s network are in high demand.

Cisco Introduction to Cybersecurity Course Final exam Answers

You will be tested on the core concepts presented across each of the five modules. There are 15 questions in total and you need to score at least 70% to pass and achieve your Cisco verified Credly badge.

  1. Which of the following firewalls hides or masquerades the private addresses of network hosts?
    Reverse proxy firewall
    Host-based firewall
    Proxy server
    Network address translation firewall
    Network layer firewall
  2. Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?

Advanced persistent threat
Network sniffing
Social engineering
Script kiddies
Rainbow tables

  1. You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?

Scalability
Availability
Integrity
Confidentiality

  1. What are the objectives of ensuring data integrity? (Choose two correct answers)

Data is unaltered during transit
Data is not changed by unauthorized entities

Data is encrypted while in transit and when stored on disks
Access to the data is authenticated
Data is available all the time

  1. An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

Scalability
Integrity
Confidentiality
Availability

  1. What of the following are examples of cracking an encrypted password? (Choose four correct answers)

Intimidation
Brute force attack
Network sniffing
Rainbow tables
Social engineering
Spraying
Dictionary attack

  1. Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?

Weaknesses in security practices
Race conditions
Access control problems
Buffer overflow
Non-validated input

  1. A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

Contact information
Next appointment
Patient records
First and last name

  1. What is the main function of the Cisco Security Incident Response Team?

To design next generation routers and switches that are less prone to cyber attacks
To design polymorphic malware
To ensure company, system and data preservation
To provide standards for new encryption techniques

  1. Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?

Application layer firewall
Proxy server
Transport layer firewall
Network layer firewall
Reverse proxy server

  1. What is the best way to avoid getting spyware on a machine?

Install the latest antivirus updates
Install the latest web browser updates
Install software only from trusted websites
Install the latest operating system updates

  1. You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?

That the Bluetooth adapter is disabled
If the laptop requires user authentication for file and media sharing
That the laptop web browser is operating in private mode
If the laptop has a master password set to secure the passwords stored in the password manager

  1. Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?

    EC Council Certified Ethical Hacker
    Microsoft Technology Associate Security Fundamentals
    ISACA CSX Cybersecurity Fundamentals
    CompTIA Security+
    ISC2 Certified Information Systems Security Professional
    Palo Alto Networks Certified Cybersecurity Associate
    Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.

    1. One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement.
      Is this behavior ethical or unethical?

    Ethical
    Unethical

    1. Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?

    Palo Alto Networks Certified Cybersecurity Associate
    ISC2 Certified Information Systems Security Professional
    Microsoft Technology Associate Security Fundamentals
    CompTIA Security+
    ISACA CSX Cybersecurity Fundamentals
    EC Council Certified Ethical Hacker

    1. What vulnerability occurs when the output of an event depends on ordered or timed outputs?

    Weaknesses in security practices
    Non-validated input
    Race conditions
    Buffer overflow
    Access control problems

    1. What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)

    Shell shock
    WannaCry
    NotPetva
    Spectre
    Meltdown

    1. If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?

    Buffer overflow
    Race conditions
    Weaknesses in security practices
    Non-validated input
    Access control problems

    1. What is the main purpose of cyberwarfare?

    To develop advanced network devices
    To gain advantage over adversaries
    To protect cloud-based data centers
    To simulate possible war scenarios among nations

    1. Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?

    Open authorization
    VPN service
    Password manager
    In-private browsing mode3

    1. What names are given to a database where all cryptocurrency transactions are recorded? (Select two correct answers)

    Blockchain
    Table
    Ledger
    Spreadsheet

    1. Which of the following items are states of data? (Choose three correct answers)

    Storage
    Text
    ASCII
    Transmission
    Binary
    Processing

    1. ‘Internet-based cameras and gaming gear are not subject to security breaches.’
      Is this statement true or false?

    True
    False

    1. What vulnerability occurs when data is written beyond the memory areas allocated to an application?

    Buffer overflow
    Access control problems
    Race conditions
    Weaknesses in security practices
    Non-validated input

    1. An organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?

    Phishing
    Adware
    Social engineering
    DDoS
    Spyware

    1. Which of the following are commonly used port scanning applications? (Select two correct answers)

    Zenmap
    Port number
    Sequence number
    Nmap

    1. What action will an IDS take upon detection of malicious traffic?

    Block or deny all traffic
    Create a network alert and log the detection
    Drop only packets identified as malicious
    Reroute malicious traffic to a honeypot

    1. Which of the following statements best describes cybersecurity?

    It is the name of a comprehensive security application for end users to protect workstations from being attacked
    It is a standard-based model for developing firewall technologies to fight against cybercrime
    It is a framework for security policy development
    It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm

    1. ‘After a data breach, it’s important to educate employees, partners and customers on how to prevent future breaches.’ Is this statement true or false?

    True
    False

    1. An employee points out a design flaw in a new product to the department manager. Is this employee’s behavior ethical or unethical?

    Ethical
    Unethical

    1. ‘Data coming into a program should be sanitized, as it could have malicious content, designed to force the program to behave in an unintended way.’ This statement describes what security vulnerability?

    Weaknesses in security practices
    Access control problems
    Buffer overflow
    Non-validated input
    Race conditions

    1. Which of the following are examples of on-path attacks? (Choose two correct answers)

    SEO poisoning
    Man-in-the-Mobile
    Ransomware
    DDoS
    Man-in-the-Middle
    Worms

    1. Which of the following firewalls filters traffic based on application, program or service?

    Context aware application firewall
    Proxy server
    Application layer firewall
    Host-based firewall
    Network layer firewall

    1. A port scan returns a ‘closed’ response. What does this mean?

    There was no reply from the host
    A service is listening on the port
    Connections to the port will be denied

    1. ‘Cryptocurrency transactions are digital.’ Is this statement true or false?

    True
    False

    1. What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?

    Apple Pay
    Google Pay
    Near Field Communications
    Cryptocurrency

    1. Which of the following tools used for incident detection can be used to detect anomalous behavior, command and control traffic, and detect infected hosts? (Choose two correct answers)

    Intrusion detection system
    Reverse proxy server
    NetFlow
    Nmap
    Honeypot

    1. What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?

    Hacker network
    Crime syndicate
    Zombie
    Botnet

    1. What is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network?

    Install a software firewall on every network device
    Place all IoT devices that have access to the Internet on an isolated network
    Disconnect all IoT devices from the Internet
    Set the security settings of workstation web browsers to a higher level

    1. What name is given to the emerging threat that hides on a computer or mobile device and uses that machine’s resources to mine cryptocurrencies?

    Phishing
    Bluejacking
    Cryptoransomware
    Cryptojacking

    1. A port scan returns an ‘open’ response. What does this mean?

    A service is listening on the port
    Connections to the port will be denied
    There was no reply from the host

    1. An employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?

    Ethical
    Unethical

    1. ‘An advanced persistent threat (APT) is usually well funded.’ Is this statement true or false?

    True
    False

    1. In networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?

    IP address
    Port number
    MAC address
    Sequence number

    1. ‘An employee does something as an organization representative with the knowledge of that organization and this action is deemed illegal. The organization is legally responsible for this action.’ Is this statement true or false?

    True
    False

    1. What tool is used to lure an attacker so that an administrator can capture, log and analyze the behavior of the attack?

    NetFlow
    Honeypot
    IDS
    Nmap

    1. ‘A data breach does not impact the reputation of an organization.’ Is this statement true or false?

    True
    False

    1. Which of the following certifications is aimed at high school and early college students, as well as anyone interested in a career change?

    CompTIA Security+
    Microsoft Technology Associate Security Fundamentals
    ISACA CSX Cybersecurity Fundamentals
    ISC2 Certified Information Systems Security Professional
    EC Council Certified Ethical Hacker
    Palo Alto Networks Certified Cybersecurity Associate

    1. Which of the following firewalls filters traffic based on source and destination data ports and filtering based on connection states?

    Network address translation firewall
    Network layer firewall
    Transport layer firewall
    Application layer firewall
    Host-based firewall

    1. Which of the following are categories of security measures or controls? (Choose three correct answers)

    Firewalls
    Guards
    Camera
    Policy and procedure
    Technology
    Awareness, training and education

    1. ‘A botnet can have tens of thousands of bots, or even hundreds of thousands.’ Is this statement true or false?

    True
    False

    1. For what purpose would a network administrator use the Nmap tool?

    To protect the private IP addresses of internal hosts
    To identify specific network anomalies
    To detect and identify open ports
    To collect and analyze security alerts and logs

    1. Which of the following certifications does not expire or require periodic recertification and is geared towards post-secondary graduates and those interested in a career change?

    EC Council Certified Ethical Hacker
    ISACA CSX Cybersecurity Fundamentals
    CompTIA Security+
    Palo Alto Networks Certified Cybersecurity Associate
    ISC2 Certified Information Systems Security Professional
    Microsoft Technology Associate Security Fundamentals

    1. What type of attack uses zombies?

    Spear phishing
    Trojan horse
    DDoS
    SEO poisoning

    1. What is the purpose of a backdoor?

    To enable software vendors to update software
    For government access
    To gain unauthorized access to a system without normal authentication procedures
    To allow developers to debug software

    1. Which of the following firewalls filters ports and system service calls on a single computer operating system?

    Network address translation firewall
    Transport layer firewall
    Host-based firewall
    Network layer firewall
    Application layer firewall

    1. What type of attack disrupts services by overwhelming network devices with bogus traffic?

    DDoS
    Zero-day
    Brute force
    Port scans

    1. ‘Cryptocurrencies are handled on a centralized exchange.’ Is this statement true or false?

    True
    False

    1. Several @Apollo employees have reported that the network access is slow. After investigation, the network administrator has learned that one employee downloaded a third-party scanning program for the printer. What type of malware might have been introduced that is causing slow performance of the network?

    Spam
    Phishing
    Worm
    Virus

    1. What is an example of cyber kill chain?

    a planned process of cyber attack

    1. An organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?

    Business continuity
    Disaster recovery
    Risk management
    Vulnerability scanning

    1. An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization.
      Is the employee’s behavior ethical or unethical?

    Ethical
    Unethical

    1. Which stage of the kill chain used by attackers focuses on the identification and selection of targets?

    delivery
    exploitation
    weaponization
    reconnaissance

    1. An employee does something as a company representative with the knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action. Is this statement true or false?

    True
    False?

    1. Which term describes the private browser mode for Google Chrome?

    Private tab
    Private browsing
    Incognito
    InPrivate

    1. What type of infiltration method allows attackers to quietly capture two-step verification SMS messages sent to users in a Man-in-the-Mobile (MITMO) attack?

    Pretexting
    Botnet
    Dos
    On-Path attack

    1. A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

    availability
    integrity
    scalability
    confidentiality

    1. Which of the following security implementations use biometrics? (Choose two correct answers)

    Fingerprint
    Phone
    Credit card
    Voice recognition
    Fob

    1. Which of the following firewalls filters traffic based on source and destination IP addresses?

    Network layer firewall
    Proxy server
    Application layer firewall
    Transport layer firewall
    Network address translation firewall

    1. Which of the following firewalls filters web content requests such as URLs and domain names?

    Application layer firewall
    Proxy server
    Reverse proxy server
    Network layer firewall
    Network address translation firewall

    1. A port scan returns a ‘dropped’ response. What does this mean?

    A service is listening on the port
    Connections to the port will be denied
    There was no reply from the host

    1. During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee’s behavior ethical or unethical?

    Ethical
    Unethical

    1. Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?

    CompTIA Security+
    Microsoft Technology Associate Security Fundamentals
    ISC2 Certified Information Systems Security Professional
    ISACA CSX Cybersecurity Fundamentals
    EC Council Certified Ethical Hacker
    Palo Alto Networks Certified Cybersecurity Associate

    1. ‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’ Is this statement true or false?

    True
    False

    1. When describing malware, what is a difference between a virus and a worm?

    A virus focuses on gaining privileged access to a device, whereas a worm does not.
    A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
    A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks.
    A virus can be used to deliver advertisements without user consent, whereas a worm cannot

    1. An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?

    Ethical
    Unethical

    1. Which of the following firewalls filters traffic based on the user, device, role, application type and threat profile?

    Context aware application firewall
    Host-based firewall
    Network address translation firewall
    Network layer firewall
    Application layer firewall

    Leave a Reply

    error: Content is protected !!
    Scroll to Top